To effectively run a cybersecurity and privacy program, you’ll need to build core cybersecurity and privacy policies that govern these...
How to Perform a Penetration Test
Penetration Testing Definition A penetration test, which is often shortened to “pen test,” is essentially a fake cyberattack. It is...
Introduction: The Whole Wide World of Privacy Regulations
This series of posts presents a survey of the privacy regulations that you’ll need to understand in order to protect your business. We’ll...
Asia-Pacific Overview: Data Protection & Privacy Regulations
Asia, in its vastness and complexity, doesn’t lend itself to a continental overview. In this post, we'll look at the Asia-Pacific Economic...
Africa Overview: Data Protection & Privacy Regulations
Over the past twenty years, privacy legislation in Africa has been gaining momentum; 33 countries in the continent now having some form of...
Non-EU Countries Overview: Data Protection & Privacy Regulations
As much as the GDPR is the 800-pound gorilla in European data privacy regulations, there are countries that are currently outside of its...
European Union Overview: Data Protection & Privacy Regulations
Three quarters of us don’t trust businesses to do the right thing with our emails, phone numbers, preferences and bank details. I find...
Canada & Mexico Overview: Data Protection & Privacy Regulations
In a previous post, we gave an overview of data privacy legislation in the United States, both federal and state. We’ll discuss our North...
United States Overview: Data Protection & Privacy Regulations
If your business is located in the United States or does business there, allow us to introduce you to the alphabet soup of regulators that...